Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

Mobile App Misconfigurations Will Lead to Security Breaches

The best defense is to keep mobile devices fixed in a safe configuration by means of an MDM policy, supplemented by app shielding and "containers" that protect important data, Gartner claims.

By 2017, 75 percent of mobile security breaches will be the result of mobile application misconfiguration, according to a report from IT research firm Gartner.

In that same year, the company predicts that the focus of endpoint breaches will shift to tablets and smartphones, as the number of mobile devices being sold to consumers continues to rise—Gartner projects nearly 2.2 billion smartphones and tablets will be sold to users in 2014.

"Mobile security breaches are—and will continue to be—the result of misconfiguration and misuse on an app level, rather than the outcome of deeply technical attacks on mobile devices," Dionisio Zumerle, principal research analyst at Gartner, said in a statement. "A classic example of misconfiguration is the misuse of personal cloud services through apps residing on smartphones and tablets. When used to convey enterprise data, these apps lead to data leaks that the organization remains unaware of for the majority of devices."

Gartner said the best defense is to keep mobile devices fixed in a safe configuration by means of a mobile device management (MDM) policy, supplemented by app shielding and "containers" that protect important data.

Further reading

Jailbreaking and rooting can also allow malware to be downloaded to the device and open it up to all sorts of malicious actions, including extraction of enterprise data. Rooted or jailbroken mobile devices also become prone to brute force attacks on passcodes.

"The most obvious platform compromises of this nature are jailbreaking on iOS or rooting on Android devices," Zumerle said. "They escalate the user's privileges on the device, effectively turning a user into an administrator."

The report also pointed out that in order to do significant damage in the mobile world, malware needs to act on devices that have been altered at an administrative level.

To help prevent incidents, Gartner published a series of recommendations for security leaders to follow as an MDM or enterprise mobility management baseline for Android and Apple devices.

One of the ways IT security specialists can reduce the number of security breaches is by specifying minimum and maximum versions of platforms and operating systems and disallowing models that cannot be updated or supported.

Organizations should also require that device passcodes include length and complexity as well as strict retry and timeout standards, and require signed apps and certificates for access to business email, virtual private networks, WiFi and shielded apps.

Zumerle also recommended favoring mobile app reputation services and establish external malware control on content before it is delivered to the mobile device.